|
Conferences in DBLP
(latincrypt) 2010 (conf/latincrypt/2010)
Broadcast Encryption with Multiple Trust Authorities. [Citation Graph (, )][DBLP]
Security of Sequential Multiple Encryption. [Citation Graph (, )][DBLP]
Mediated Traceable Anonymous Encryption. [Citation Graph (, )][DBLP]
Starfish on Strike. [Citation Graph (, )][DBLP]
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. [Citation Graph (, )][DBLP]
Fixed Argument Pairings. [Citation Graph (, )][DBLP]
New Software Speed Records for Cryptographic Pairings. [Citation Graph (, )][DBLP]
Accelerating Lattice Reduction with FPGAs. [Citation Graph (, )][DBLP]
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets. [Citation Graph (, )][DBLP]
Communication Optimal Multi-valued Asynchronous Broadcast Protocol. [Citation Graph (, )][DBLP]
On the Impossibility of Batch Update for Cryptographic Accumulators. [Citation Graph (, )][DBLP]
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations. [Citation Graph (, )][DBLP]
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256. [Citation Graph (, )][DBLP]
Generic Attacks on Misty Schemes. [Citation Graph (, )][DBLP]
Cryptanalysis of the Hidden Matrix Cryptosystem. [Citation Graph (, )][DBLP]
A Lattice-Based Threshold Ring Signature Scheme. [Citation Graph (, )][DBLP]
Defeating Any Secret Cryptography with SCARE Attacks. [Citation Graph (, )][DBLP]
How Leaky Is an Extractor? [Citation Graph (, )][DBLP]
Combined Implementation Attack Resistant Exponentiation. [Citation Graph (, )][DBLP]
|